

Previous
Next
Index
Thread
Re: Telepathy/Parapsychology etc.

-
To: Public Netbase NewsAgent
-
Subject: Re: Telepathy/Parapsychology etc.
-
From: Stewart Robert Hinsley <stewart@meden.demon.co.uk>
-
Date: Sun, 30 Jun 1996 16:37:45 -0700 (PDT)
-
Article: rec.arts.sf.science.27853
-
Score: 100

In article <molhant.834634198@tornade.ERE.UMontreal.CA>
molhant@ERE.UMontreal.CA "Molhant Norman" writes:
> That aspect of it (i.e.: concealed channels [sorry, concealed is not the
> exact technical term - the word I'm thinking about {and not finding} is
> frequently used in the field of computer security to describe non-obvious
> ways to pass info through the security barriers, like modulating the load
> on the system, and stuff like that]) is most often not examined in telepathy
> experiments, which is a bloody shame, I think.
The computer security term is 'covert channel'. They are divided into
'storage channels' and 'timing channels'. The standard TCSEC D and C
level equivalent operating systems contain plenty of them. For example,
in older UNIXes the _process ID_ returned by _fork_(2) provides a
covert channel.
>
> Bye!
> Norman.
--
Stewart Robert Hinsley Managers are the servants of their staff
stewart@meden.demon.co.uk



